First published: Fri Aug 26 2022(Updated: )
A malicious unauthorized PAM user can access the administration configuration data and change the values.
Credit: secure@symantec.com
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom Symantec Privileged Access Management | >=3.4.0.0<3.4.6.05 | |
Broadcom Symantec Privileged Access Management | >=4.0.0.0<4.0.0.05 | |
Broadcom Symantec Privileged Access Management | >=4.0.1.0<4.0.1.19 | |
Broadcom Symantec Privileged Access Management | >=4.0.2.0<4.0.2.04 | |
Broadcom Symantec Privileged Access Management | >=4.0.3.0<4.0.3.01 | |
Broadcom Symantec Privileged Access Management | >=4.1.0.0<4.1.0.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-25625 has a critical severity rating as it allows unauthorized users to access and modify sensitive administrative configuration data.
To fix CVE-2022-25625, update your Broadcom Symantec Privileged Access Management software to a version higher than 4.1.0.10.
CVE-2022-25625 affects versions from 3.4.0.0 to 4.1.0.10 of Broadcom Symantec Privileged Access Management.
Yes, a malicious unauthorized PAM user can exploit CVE-2022-25625 to access and change important administration configuration values.
Currently, there are no official workarounds for CVE-2022-25625, so immediate software updates are recommended.